MIS Chapter 5-8 – Flashcards

Unlock all answers in this set

Unlock answers
question
It is easy to manage all the data coming into an organization.
answer
Answer: False
question
The best way to capture the data in an organized format is to use a database.
answer
Answer: True
question
Increasing amounts of external data need to be considered in making organizational decisions.
answer
Answer: True
question
Data rot refers to the quality of the data itself.
answer
Answer: False
question
It is important for applications and data to be dependent on each other.
answer
Answer: False
question
A negative value for a student's grade point average is an example of a data integrity problem.
answer
Answer: True
question
An entity is a person, place, thing, or event about which information is maintained.
answer
Answer: True
question
An attribute is any characteristic or quality that describes a particular entity.
answer
Answer: True
question
The secondary key is a field that identifies a record with complete uniqueness.
answer
Answer: False
question
Entity-relationship diagrams are documents that show the primary and secondary keys associated with a conceptual data model.
answer
Answer: False
question
You would be an instance of your university's STUDENT class.
answer
Answer: True
question
The relational database model is based on the concept of three-dimensional tables.
answer
Answer: False
question
Structured query language is a relational database language that enables users to perform complicated searches with relatively simple statements.
answer
Answer: True
question
The data dictionary stores definitions of data elements, characteristics that use the data elements, physical representation of the data elements, data ownership, and security.
answer
Answer: True
question
When data are normalized, attributes in the table depend on the primary key and any secondary keys.
answer
Answer: False
question
In a data warehouse, existing data are constantly purged as new data come in.
answer
Answer: False
question
An organization's data warehouse generally maintains its operational data.
answer
Answer: False
question
Online analytical processing (OLAP) involves the analysis of accumulated data by end users.
answer
Answer: True
question
Data marts are designed for the end-user needs in a strategic business unit or department.
answer
Answer: True
question
Master data are generated and captured by operational systems.
answer
Answer: False
question
Tacit knowledge is the more objective, rational, and technical types of knowledge.
answer
Answer: False
question
Explicit knowledge refers to the cumulative store of subjective learning, which is personal and hard to formalize.
answer
Answer: False
question
Which of the following has (have) the broadest impact on an organization? a) Decisions about hardware. b) Decisions about software. c) Decisions about data. d) Both "decisions about hardware" and "decisions about software." e) All of these have an equal impact.
answer
c) Decisions about data.
question
24) Which of the following is not a source for external data? a) Commercial databases b) Corporate databases c) Sensors d) Satellites e) Government reports
answer
b) Corporate databases
question
Which of the following is not a reason why managing data is difficult over time? a) New systems are developed. b) The media the data are stored on becomes problematic. c) New sources of data are created. d) The amount of data increases exponentially. e) All of these are reasons why managing data is difficult over time.
answer
e) All of these are reasons why managing data is difficult over time.
question
Not including alphabetic characters in a Social Security Number field is an example of _____ . a) Data isolation. b) Data integrity. c) Data consistency. d) Data redundancy. e) Application/data dependence
answer
b) Data integrity.
question
_____ occurs when applications cannot access data associated with other applications. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
answer
a) Data isolation
question
_____ occurs when the same data are stored in many places. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
answer
d) Data redundancy
question
_____ occurs when various copies of the data agree. a) Data isolation b) Data integrity c) Data consistency d) Data redundancy e) Application/Data dependence
answer
c) Data consistency
question
You have moved to a different apartment, but your electricity bill continues to be sent to your old address. The Post Office in your town has which problem with its data management? a) Data redundancy b) Data inconsistency c) Data isolation d) Data security e) Data dependence
answer
b) Data inconsistency
question
Place the following members of the data hierarchy in their correct order: a) Bit - byte - field - record - database - file b) Bit - field - byte - record - file - database c) Byte - bit - record - field - database d) Bit - byte - field - record - file - database e) Bit - record - field - byte - file -- database
answer
d) Bit - byte - field - record - file - database
question
In the data hierarchy, the smallest element is the _____. a) Record. b) Bit. c) Byte. d) Character. e) File.
answer
b) Bit.
question
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number. a) Byte b) Field c) Record d) File e) Database
answer
b) Field
question
A(n) _____ is a logical grouping of related fields. a) Byte b) Field c) Record d) File e) Database
answer
c) Record
question
A(n) _____ is a logical grouping of related records. a) Byte b) Field c) Record d) File e) Database
answer
d) File
question
A(n) _____ represents a single character, such as a letter, number, or symbol. a) Byte b) Field c) Record d) File e) Database
answer
a) Byte
question
In a database, the primary key field is used to _____. a) specify an entity b) create linked lists c) identify duplicated data d) uniquely identify a record e) uniquely identify an attribute
answer
d) uniquely identify a record
question
_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy. a) Primary keys b) Secondary keys c) Duplicate keys d) Attribute keys e) Record keys
answer
b) Secondary keys
question
As an individual student in your university's student database, you are a(n) _____ of the STUDENT class. a) instance b) individual c) representative d) entity e) relationship
answer
a) instance
question
At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship? a) one-to-one b) one-to-many c) many-to-one d) many-to-many e) some-to-many
answer
d) many-to-many
question
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n): a) attribute. b) entity. c) primary key. d) object. e) file.
answer
a) attribute.
question
A database management system is primarily a(n) _____. a) file-handling program b) data-modeling program c) interface between applications and a database d) interface between data and a database e) interface between queries and a database
answer
c) interface between applications and a database
question
In the relational database model, related tables can be joined when they contain common _____. a) primary keys b) rows c) records d) columns e) files
answer
d) columns
question
_____ tell the database management system which records are joined with others in related tables. a) Primary keys b) Secondary keys c) Common attributes d) Common files e) Common fields
answer
a) Primary keys
question
Data dictionaries perform all of the following functions except: a) Providing information on each record. b) Providing information on why attributes are needed in the database. c) Defining the format necessary to enter data into the database. d) Providing information on the name of each attribute. e) Providing information on how often attributes should be updated.
answer
a) Providing information on each record.
question
In a relational database, every row represents a(n) _____. a) file b) record c) attribute d) primary key e) secondary key
answer
b) record
question
A standardized language used to manipulate data is _____. a) MS-Access b) Oracle c) query-by-example language d) structured query language e) data-manipulation language
answer
d) structured query language
question
Data dictionaries provide which of the following advantages to the organization? a) They reduce data inconsistency. b) They enable faster program development. c) They make it easier to modify data and information. d) Both "They enable faster program development." and "They make it easier to modify data and information." e) All of these
answer
e) All of these
question
_____ is a method for analyzing and reducing a relational database to its most streamlined form. a) Structured query b) Normalization c) Query by example d) Joining e) Relational analysis
answer
b) Normalization
question
When data are normalized, attributes in the table depend only on the _____. a) secondary key b) common attribute c) primary key d) common row e) common record
answer
c) primary key
question
The data in a data warehouse have which of the following characteristics? a) They are organized by subject. b) They are coded in different formats. c) They are updated in real time. d) They are typically retained for a defined, but limited, period of time. e) They are organized in a hierarchical structure.
answer
a) They are organized by subject.
question
The data in a data warehouse: a) are updated constantly in real time. b) are updated in batch mode, approximately once per day. c) are not updated. d) are purged constantly as new data enter. e) are available for MIS analysts, but not users
answer
c) are not updated.
question
The process of moving data from various sources into the data warehouse is called: a) uploading. b) extracting, transforming, and loading. c) online transaction processing. d) master data management. e) online analytical processing.
answer
b) extracting, transforming, and loading.
question
Compared to data warehouses, data marts have which one of the following characteristics? a) They cost less. b) They have longer lead times for implementation. c) They provide for central rather than local control. d) They contain more information. e) They are more difficult to navigate
answer
a) They cost less
question
_____ is a formal approach to managing data consistently across an entire organization. a) Database management b) Enterprise information management c) Data warehousing d) Data governance e) Data mart
answer
d) Data governance
question
_____ provide(s) companies with a single version of the truth for their data. a) Data warehouses b) Data marts c) Databases d) Master data management e) Enterprise information management
answer
d) Master data management
question
Organizations are turning to data governance for which of the following reasons? a) They have too little data. b) They are responding to federal regulations. c) Their data are typically structured. d) Their data are usually located in the organization's databases. e) Data across their organizations are generally consistent.
answer
b) They are responding to federal regulations
question
_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities. a) Transaction data, master data b) Source data, transaction data c) Operational data, master data d) Master data, source data e) Business dimensional data, databases
answer
a) Transaction data, master data
question
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner. a) Discovery b) Knowledge management c) Decision support d) Online analytical processing e) Data mining
answer
b) Knowledge management
question
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem. a) Knowledge, information b) Data, information c) Information, data d) Information, knowledge e) Data, knowledge
answer
a) Knowledge, information
question
Explicit knowledge has which of the following characteristics? a) objective b) personal c) slow d) costly to transfer e) ambiguous
answer
a) objective
question
Tacit knowledge has which of the following characteristics? a) codified b) objective c) unstructured d) rational e) technical
answer
c) unstructured
question
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge. a) tacit b) explicit c) managerial d) geographical e) cultural
answer
b) explicit
question
The most important benefit of knowledge management systems is: a) They improve customer service. b) They make best practices available to employees. c) They enable the organization to retain scarce knowledge when employees retire. d) They improve employee morale. e) They make product development more efficient.
answer
b) They make best practices available to employees.
question
Refer to IT's About Business 5.2 - Cell phone owners in Mexico: The cell phone registry is useless because: a) data for some cell phones are missing. b) data for some cell phones are inaccurate. c) very few Mexicans can afford cell phones. d) All of these e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."
answer
e) Both "data for some cell phones are missing" and "data for some cell phones are inaccurate."
question
Refer to IT's About Business 5.3 - Isle of Capri Casinos. Capri Casinos decided it needed a data warehouse for all of the following reasons except: a) to process transactions faster. b) to provide a complete view of the customer. c) to enhance its marketing campaigns d) to provide business users access to business-wide data. e) to determine where to place its slot machines.
answer
a) to process transactions faster.
question
Refer to Opening Case - Big Data. Which of the following is not a problem created by "Big Data"? a) The data is not reliable. b) The amount of data exceeds the available storage. c) The existing networks can't handle the volume. d) It is more difficult to protect the data. e) The vast amounts of data make decision making more complicated.
answer
a) The data is not reliable.
question
Refer to Closing Case - CoStar Group. The target audience for CoStar's aggregated commercial real estate data was a) banks. b) building owners. c) real estate agents. d) builders. e) All these
answer
e) All these
question
In data warehouses and data marts, data are stored in a multidimensional structure and visually represented as a data cube. Figure 3.12 is an example of a data cube of sales with the dimensions of product, geographic area, and time period (year). These are called business dimensions. What would the business dimensions be for Walmart's sales with its many sales transactions for many products in many stores that would allow them to do weekly analysis? a) Customer, product, and month b) Customer, product, store c) Customer, product, store, and month d) Customer, product, store, and week e) Product, store, and week
answer
e) Product, store, and week
question
Today, large corporations are able to process big data but only at great expense.
answer
False
question
A local area network connects two or more communicating devices in a limited geographical area.
answer
Answer: True
question
Network interface cards are special adapters that link an individual device to the communications medium on a local area network.
answer
Answer: True
question
The network interface card typically houses the LAN's network operating system.
answer
Answer: False
question
Wide-area networks have a large capacity, and they typically use a single communications channel.
answer
Answer: False
question
Digital signals are continuous waves that transmit information by altering the characteristics of the waves.
answer
Answer: False
question
Digital signals have two parameters: frequency and amplitude.
answer
Answer: False
question
The U.S. public telephone system was designed as an analog network to carry voice signals.
answer
Answer: True
question
Cable media use wires or cables to transmit data and information.
answer
Answer: True
question
Twisted-pair wire is the least-used form of communications wiring.
answer
Answer: False
question
Cladding is the coating that surrounds fiber-optic cables and prevents light from leaking out of the fiber.
answer
Answer: True
question
Systems that use digital subscriber lines (DSL) do not require modems.
answer
Answer: False
question
Currently, ATM networks operate only on fiber-optic cable.
answer
Answer: True
question
The Internet is a global network of computer networks.
answer
Answer: True
question
An intranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
answer
Answer: True
question
Intranets support discovery, communication, and collaboration inside an organization.
answer
Answer: True
question
An extranet is a network that uses Internet technologies and is designed to serve the information needs of a single organization.
answer
Answer: False
question
Extranets offer limited accessibility to the intranets of participating companies.
answer
Answer: True
question
An Internet service provider is a company that offers Internet connections for a fee.
answer
Answer: True
question
Internet kiosks are computer terminals located in public places like libraries and airports.
answer
Answer: True
question
A domain name is the official name assigned to an Internet site, consisting of multiple parts, separated by dots, which are translated from right to left in locating the site.
answer
Answer: True
question
The rightmost part of an Internet name is the top-level specification, or the zone.
answer
Answer: True
question
The World Wide Web is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture.
answer
Answer: True
question
Uniform resource locators (URLs) point to the address of a specific resource or site on the Web.
answer
Answer: True
question
Uniform resource locators (URLs) are software applications through which users access the Web.
answer
Answer: False
question
The hypertext transport protocol (HTTP) is the communications standard used to transfer pages across the World Wide Web portion of the Internet.
answer
Answer: True
question
A major problem of the discovery applications of networks is the huge amount of information available.
answer
Answer: True
question
Metasearch engines search several engines at once and integrate the findings of the various search engines.
answer
Answer: True
question
The quality of automatic translation of Web pages is usually just as good as human translation.
answer
Answer: False
question
Commercial portals are intended for broad audiences and offer fairly routine content.
answer
Answer: True
question
Industrywide portals are intended for broad audiences and offer fairly routine content.
answer
Answer: False
question
Electronic mail is the largest-volume application running over the Internet.
answer
Answer: True
question
With Voice-over-IP, every call opens up a dedicated circuit for the duration of the call.
answer
Answer: False
question
E-learning is conducted only in virtual classrooms, where all coursework is completed online.
answer
Answer: False
question
Virtual universities are online universities from which students take classes from home or at an off-site location, via the Internet.
answer
Answer: True
question
Employees who telecommute have generally found that the experience enhances their careers.
answer
Answer: False
question
_____ refers to the range of frequencies available in any communications channel. a) Protocol b) Broadband c) Capacity d) Narrowband e) Bandwidth
answer
e) Bandwidth
question
Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these
answer
e) All of these
question
The components of a local area network include which of the following? a) File server b) Client computers c) Wireline or wireless communications media d) Network interface cards e) All of these
answer
e) All of these
question
Which of the following is not a component of a local area network? a) File server b) Client computers c) Bridge d) Network interface cards e) All of these
answer
c) Bridge
question
A _____ connects dissimilar networks. a) Router b) Network interface card c) Bridge d) Gateway e) File server
answer
d) Gateway
question
A(n) _____ connects two or more devices in a limited geographical area. a) Local area network b) Wide-area network c) Personal area network d) Enterprise network e) Value added network
answer
a) Local area network
question
A _____ sends messages through several connected LANs or to a wide-area network. a) Router b) Network interface card c) Bridge d) Gateway e) File server
answer
a) Router
question
A _____ allows a device to physically connect to a local area network's communications medium. a) File server b) Network interface card c) Network operating system d) Communications channel e) Gateway
answer
b) Network interface card
question
All of the following statements concerning wide-area networks are true except: a) They are provided by individual companies. b) They have large capacity. c) They cover large geographical areas. d) They combine multiple communications channels. e) The Internet is an example of a wide-area network.
answer
a) They are provided by individual companies.
question
The function of _____ is to convert digital signals to analog signals and vice-versa. a) Modems b) Multiplexers c) Front-end processors d) Servers e) Clients
answer
a) Modems
question
_____ signals convey information in wave form, whereas _____ signals convey information in binary form. a) Analog, packet b) Analog, digital c) Digital, packet d) Digital, analog e) Packet, analog
answer
b) Analog, digital
question
_____ are hardware devices that support data transmission and reception across a telecommunications system. a) Integrated services digital networks b) Digital subscriber lines c) Communications channels d) Integrated circuits e) Communications processors
answer
c) Communications channels
question
Which of the following is not a communications channel? a) Fiber-optic cable b) Satellite transmission c) Twisted-pair wire d) Integrated circuits e) Cellular radio
answer
d) Integrated circuits
question
Which of the following is not a characteristic of twisted-pair wire? a) Inexpensive b) Easy to work with c) Subject to interference from other electrical sources d) Secure transmissions e) None of these
answer
d) Secure transmissions
question
The cable medium with the highest bandwidth is: a) Twisted-pair wire b) Coaxial cable c) Fiber-optic cable d) Cellular radio e) Copper cable
answer
c) Fiber-optic cable
question
Data are sent through a fiber-optic cable by a(n) _______. a) Optical switch b) Electromagnetic switch c) Laser d) Multiplexer e) Optical modem
answer
c) Laser
question
Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
answer
b) Asynchronous transfer mode
question
Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
answer
c) Synchronous optical network
question
Which of the following is a digital transmission system that defines circuits that operate at different rates, all of which are multiples of the basic 64 Kbps used to transport a single voice call? a) Digital subscriber line b) Asynchronous transfer mode c) Synchronous optical network d) T-carrier system e) ISDN
answer
d) T-carrier system
question
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed. a) Protocols b) Client/server architectures c) WANs d) Application software packages e) Developmental architectures
answer
a) Protocols
question
A protocol is: a) A device that handles the switching of voice and data in a local area network. b) A standard set of rules and procedures for the control of communications in a network. c) A communications service for the connection of devices in a local area network. d) The main communications channel in a wide-area network. e) Synonymous with network interface card
answer
b) A standard set of rules and procedures for the control of communications in a network
question
The part of a network that handles the major traffic is the ________. a) Front end b) Network interface c) Multiplexer d) Backbone e) Front end processor
answer
d) Backbone
question
Which of the following enables users to send data across sometimes unreliable networks? a) Ethernet b) TCP/IP c) Protocols d) Digital subscriber lines e) Integrated services digital network
answer
b) TCP/IP
question
In TCP/IP, IP is responsible for: a) Disassembling and reassembling of packets during transmission. b) Establishing the Internet connection between two computers. c) Moving packets over the network. d) Sequencing the transfer of packets across the network. e) Error checking
answer
a) Disassembling and reassembling of packets during transmission.
question
Which of the following statements concerning packet switching is not true? a) Packets contain a sequence number. b) Packets are routed through different paths. c) Packets require dedicated circuits. d) Packets use TCP/IP to carry their data. e) Packets contain destination addressing. Answer: c
answer
c) Packets require dedicated circuits
question
A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______. a) Open systems b) Client/server c) Peer-to-peer d) Centralized e) Mainframe-centric
answer
b) Client/server
question
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time. a) Leeching b) Collaboration c) Packet switching d) Torrents e) Swarming
answer
e) Swarming
question
The _____ is a global wide-area network that connects approximately 1 million organizational computer networks. a) Ethernet b) Extranet c) Internet d) Intranet e) World Wide Web
answer
c) Internet
question
) A(n) _____ is a network designed to serve the internal informational needs of a single organization. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web
answer
d) Intranet
question
A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners. a) Global network b) Extranet c) Internet d) Intranet e) World Wide Web
answer
b) Extranet
question
Internet service providers connect to one another through _____. a) Internet connection points b) Common carrier connection points c) Network access points d) Network connection points e) An extranet
answer
c) Network access points
question
_____ are Internet access points that are located in public places, such as libraries and airports. a) Clients b) Servers c) Internet access computers d) Network computer e) Internet kiosks
answer
e) Internet kiosks
question
Each site on the Internet gets an assigned address, which is a(n) _____. a) TCP address b) IP address c) URL address d) ISO/OSI identifier e) World Wide Web address
answer
c) URL address
question
Consider this domain name, www.business.gsu.edu. The "edu" is the _______. a) Top-level domain b) URL c) Web site locator d) Name of the computer e) Address of the Webmaster
answer
a) Top-level domain
question
Consider this domain name, www.business.gsu.edu. The "gsu" is the __________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster
answer
b) Name of the organization
question
Consider this domain name, www.business.gsu.edu. The "business" is the ________. a) Top-level domain b) Name of the organization c) URL d) Name of the specific computer e) Address of the Webmaster
answer
d) Name of the specific computer
question
Applications offered by the Internet2 include which of the following? a) remote diagnosis b) digital libraries c) distance education d) virtual laboratories e) all of these
answer
e) all of these
question
Networks enable which of the following applications? a) Discovery b) Communications c) Collaboration d) Web services e) All of these
answer
e) All of these
question
Which of the following are advantages of computer networks? a) They enable organizations to be more flexible. b) They enable companies to share hardware, computer applications, and data. c) They enable geographically dispersed employees to work together. d) They provide a critical link between businesses and their customers. e) All of these
answer
e) All of these
question
Which network application(s) enable(s) users to access information located in databases all over the world? a) Discovery b) Communications c) Collaboration d) Web services e) None of these
answer
a) Discovery
question
Which of the following statements about publication of material in foreign languages is not correct? a) It is a competitive necessity. b) It must be accurate. c) It is expensive. d) Content must be localized to the needs of people in local markets. e) It is not yet a major consideration for most companies.
answer
e) It is not yet a major consideration for most companies
question
_____ portals offer content for diverse communities and are intended for broad audiences. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial
answer
e) Commercial
question
_____ portals support communities such as hobby groups or political parties. a) Industrywide b) Personal c) Affinity d) Corporate e) Commercial
answer
c) Affinity
question
_____ portals coordinate content within relatively narrow organizational and partners' communities. a) Publishing b) Personal c) Affinity d) Corporate e) Commercial
answer
d) Corporate
question
Many organizations have implemented corporate portals for which of the following reasons? a) To cut costs b) To free up time for busy managers c) To improve profitability d) To offer customers self-service opportunities e) All of these
answer
e) All of these
question
Portals are an example of which network application? a) Discovery b) Collaboration c) Communications d) Web services e) None of these
answer
a) Discovery
question
With _____, every call opens up a dedicated circuit for the duration of the call. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat
answer
b) Plain old telephone service
question
With _____, phone calls are treated as just another kind of data. a) Voice over IP b) Plain old telephone service c) Chat rooms d) Teleconference e) Internet relay chat
answer
a) Voice over IP
question
Skype is an example of _______. a) Teleconference b) Telepresence c) Plain old telephone service d) Voice over IP e) Videoconference
answer
d) Voice over IP
question
Workflow, groupware, and telepresence systems are examples of which network application? a) Discovery b) Communications c) Collaboration d) Web services e) None of these
answer
c) Collaboration
question
The newest type of videoconferencing technology is ________. a) Teleconferencing b) Telepresence c) Work group analysis software d) Workflow software e) Groupware
answer
b) Telepresence
question
In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation. a) Teleconference b) Group decision support c) Telepresence d) Telephone conference call e) Crowdsourcing
answer
c) Telepresence
question
The benefits of e-learning include which of the following? a) Increased content retention b) Current, high-quality content c) Consistency d) Flexibility e) All of these
answer
e) All of these
question
Which of the following is not a disadvantage of telecommuting for employees? a) Fewer opportunities for housebound people b) Possible loss of fringe benefits c) Lower pay (in some cases) d) No workplace visibility e) Slower promotions
answer
a) Fewer opportunities for housebound people
question
Refer to Opening Case - The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality? a) The amount of video traffic on the Internet is increasing. b) Under current models, the investment required to meet future demand exceeds projected revenue growth. c) Net neutrality might hinder U.S. competitiveness. d) Network providers could censor certain content by slowing down or blocking access. e) Telecommunications and cable companies are in favor of net neutrality.
answer
e) Telecommunications and cable companies are in favor of net neutrality.
question
1) In traditional commerce, one or more of the following can be digital: the product or service, the process, and the delivery agent.
answer
Answer: False
question
2) Visiting the Web site of a car manufacturer (e.g., www.gm.com), entering the specifications for the car you want, and then picking up your car at your local dealership is an example of partial electronic commerce.
answer
Answer: True
question
3) eBay is a good example of business-to-consumer electronic commerce.
answer
Answer: False
question
4) Forward auctions are auctions that sellers use as a channel to many potential buyers.
answer
Answer: True
question
5) Even though B2C EC is much larger by volume, B2B is more complex.
answer
Answer: False
question
6) An electronic storefront is a Web site on the Internet that represents a single store.
answer
Answer: True
question
7) You can make a purchase in a referral mall.
answer
Answer: False
question
8) Selling products such as books and computers on the Internet may reduce vendors' selling costs by 20 to 40 percent, with further reductions being difficult because the products must be delivered physically.
answer
Answer: True
question
9) Virtual banks are those banks that are dedicated only to Internet transactions.
answer
Answer: True
question
10) Channel conflict occurs when click-and-mortar companies have problems with their regular distributors when they sell directly to customers online.
answer
Answer: True
question
11) Internet advertising is impersonal, one-way mass communication.
answer
Answer: False
question
12) Banners are the most common form of advertisement on the Internet.
answer
Answer: True
question
13) Hacking is the indiscriminate distribution of electronic ads without permission of the receiver.
answer
Answer: False
question
14) Business-to-consumer applications comprise the majority of electronic commerce volume.
answer
Answer: False
question
15) The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions.
answer
Answer: False
question
16) The buy-side marketplace is similar to the business-to-consumer model.
answer
Answer: False
question
17) Horizontal exchanges connect buyers and sellers across many industries.
answer
Answer: True
question
18) In most cases, traditional payment systems are not effective for electronic commerce.
answer
Answer: True
question
19) Smart cards can be used as credit cards, debit cards, and/or loyalty cards.
answer
Answer: True
question
20) Each buyer needs only one e-wallet for all merchants.
answer
Answer: False
question
21) E-commerce affects only businesses that sell products online.
answer
Answer: False
question
25) Which of the following is not an effect that E-commerce has had on organizations? a) E-commerce enables smaller businesses to operate in areas dominated by larger companies. b) E-commerce increases the number of potential customers to whom the company can market its products. c) E-commerce is a costly medium for increasing market share. d) E-commerce removes many barriers for start-up businesses. e) E-commerce makes it easy to reach customers around the world.
answer
c) E-commerce is a costly medium for increasing market share.
question
26) _____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization. a) Business-to-business electronic commerce, business-to-customer electronic commerce b) Electronic commerce, electronic business c) Business-to-customer electronic commerce, business-to-business electronic commerce d) Business-to-business electronic commerce, intrabusiness electronic commerce e) Electronic business, electronic commerce
answer
b) Electronic commerce, electronic business
question
27) The degree of digitization relates to all of the following except: a) the product or service sold b) the process by which the product is produced c) the delivery agent or intermediary d) the size of e-commerce transactions e) none of these
answer
d) the size of e-commerce transactions
question
28) In _______ e-commerce, the sellers and buyers are organizations. a) government-to-citizen b) consumer-to-consumer c) business-to-business d) business-to-consumer e) consumer-to-business
answer
c) business-to-business
question
29) In ________ e-commerce, an organization provides information and services to its workers. a) business-to-employee b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) government-to-business
answer
a) business-to-employee
question
30) Direct payment of Social Security benefits is an example of ______ e-commerce. a) government-to-citizen b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) business-to-business
answer
a) government-to-citizen
question
31) If you are an worker managing your fringe benefits over your company's intranet, you are engaging in _________ e-commerce. a) business-to-business b) business-to-consumer c) consumer-to-consumer d) business-to-employee e) government-to-citizen
answer
d) business-to-employee
question
32) Which of the following statements regarding the relationship between electronic commerce and search is not correct? a) Purchases often follow successful online searches. b) Shopping carts are often abandoned after unsuccessful online searches. c) Retailers will provide fewer product details to avoid information overload for customers. d) Customers will be able to find the closest store offering the product that they want. e) Customers will have more relevant product information in the near future.
answer
c) Retailers will provide fewer product details to avoid information overload for customers.
question
33) In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins. a) forward b) static c) reverse d) physical e) simple
answer
c) reverse
question
34) eBay uses a _____ auction. a) forward b) static c) reverse d) physical e) simple
answer
a) forward
question
35) _____ auctions employ a request for quotation. a) Forward b) Static c) Reverse d) Physical e) Simple
answer
c) Reverse
question
36) _____ auctions are the most common auction model for large purchases. a) Forward b) Static c) Reverse d) Physical e) Simple
answer
c) Reverse
question
37) In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? a) find-the-best-price b) electronic tendering system c) name-your-own-price d) online direct marketing e) affiliate marketing
answer
b) electronic tendering system
question
38) A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model? a) find-the-best-price b) electronic tendering system c) name-your-own-price d) online direct marketing e) affiliate marketing
answer
e) affiliate marketing
question
39) Which type of electronic commerce is the largest by volume? a) business-to-employee b) consumer-to-consumer c) business-to-business d) business-to-consumer e) none of these
answer
c) business-to-business
question
40) Which type of electronic commerce does Amazon practice? a) business-to-employee b) consumer-to-consumer c) consumer- to-business d) business-to-consumer e) employee-to-business
answer
d) business-to-consumer
question
41) _______ e-commerce is also known as e-tailing. a) Business-to-business b) Collaborative commerce c) Intrabusiness d) Business-to-consumer e) Consumer-to-business
answer
d) Business-to-consumer
question
42) The advantages of electronic commerce for consumers include all of the following except: a) You can buy from home 24 hours per day, 7 days per week. b) You have a wider variety of products to choose from. c) You typically cannot access additional information, so you do not have information overload. d) You can easily compare prices and features. e) You can find unique items.
answer
c) You typically cannot access additional information, so you do not have information overload.
question
43) Which of the following is not an electronic commerce application? a) home banking b) buying stocks c) evaluating an employee d) conducting an auction e) buying real estate
answer
c) evaluating an employee
question
44) Which of the following is not an advantage of e-tailing? a) You can buy from home, 24 hours per day. b) You have only a few products to choose from. c) You can obtain detailed information on products. d) You can compare competitors' products and prices. e) All of these
answer
b) You have only a few products to choose from.
question
45) ________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen. a) Disintegration b) Supply chain integration c) Direct sales d) Disintermediation e) Value-added services
answer
d) Disintermediation
question
46) Cyberbanking offers all of the following advantages except: a) It is convenient for customers. b) It saves time for customers. c) It includes inexpensive transactions for the bank. d) It can help recruit remote customers. e) It is more expensive for the customer.
answer
e) It is more expensive for the customer.
question
47) Which of the following is a problem that e-commerce can cause for the airline industry? a) Too many fares b) Mistakes in fares c) Too few fares d) No fares offered on certain routes e) Too many fares offered on certain routes
answer
b) Mistakes in fares
question
50) Difficulties in order fulfillment are most closely associated with which type of electronic commerce? a) business-to-business b) business-to-consumer c) government-to-citizen d) business-to-employee e) mobile commerce
answer
b) business-to-consumer
question
51) Internet advertising improves on traditional advertising in all of the following ways except: a) Internet ads can be updated at any time at minimal cost. b) Internet ads can reach large numbers of potential buyers all over the world. c) Internet ads are always more effective than other types of advertising. d) Internet ads can make effective use of multimedia. e) Internet ads are current.
answer
c) Internet ads are always more effective than other types of advertising.
question
52) A _____ is automatically launched by some trigger and appears behind the active window. a) keyword banner b) random banner c) pop-up ad d) pop-under ad e) text box
answer
d) pop-under ad
question
53) _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. a) Viral marketing b) Personalized marketing c) Permission marketing d) Paper catalogs e) Direct mail
answer
c) Permission marketing
question
54) _____ refers to online word-of-mouth marketing. a) Permission marketing b) One-to-one marketing c) Personalized marketing d) Viral marketing e) Direct mail
answer
d) Viral marketing
question
55) In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange
answer
b) sell-side
question
56) The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange
answer
b) sell-side
question
57) In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange
answer
a) buy-side
question
58) In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange
answer
d) group purchasing
question
59) In _____, direct and indirect materials in one industry are purchased on an as-needed basis. a) horizontal exchanges b) vertical exchanges c) buy-side marketplaces d) functional exchanges e) sell-side marketplaces
answer
b) vertical exchanges
question
60) _____ connect buyers and sellers across many industries and are used mainly for indirect materials. a) Horizontal exchanges b) Vertical exchanges c) Buy-side marketplaces d) Functional exchanges e) Sell-side marketplaces
answer
a) Horizontal exchanges
question
61) All of the following are limitations of traditional payment methods in electronic commerce except: a) Cash cannot be used because there is no face-to-face contact. b) Paying for goods and services via the mail takes more time. c) Not all organizations accept credit cards. d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer. e) None of these
answer
d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer.
question
62) _____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards
answer
a) Electronic checks
question
63) _____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer's and seller's banks. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards
answer
b) Electronic credit cards
question
64) _____ are typically used for unplanned B2B purchases for amounts under $2000. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
answer
c) Purchasing cards
question
65) ______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
answer
b) Stored-value money cards
question
66) _____ contain a chip that can store information and be used for several purposes. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
answer
d) Smart cards
question
67) _____ enable two individuals to transfer funds without using a credit card. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
answer
e) Person-to-person payments
question
68) _____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing. a) Electronic checks b) Digital wallets c) Purchasing cards d) Smart cards e) Person-to-person payments
answer
b) Digital wallets
question
69) The practice of using similar but not identical domain names is called _____. a) domain spoofing b) domain masquerading c) domain tasting d) cybersquatting e) domain fraud
answer
c) domain tasting
question
70) _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. a) Domain spoofing b) Domain masquerading c) Domain tasting d) Cybersquatting e) Domain fraud
answer
d) Cybersquatting
question
71) The device that Treat America installed on top of each of their machines communicates the following pieces of data except: a) the amount of money in the machine at any given minute. b) the amount of product inventory remaining. c) whether the machine had been moved. d) the number of customers. e) whether the door had been opened after business hours.
answer
d) the number of customers.
question
72) Companies use Web sites for all of the following reasons except: a) To reduce operational and transaction costs. b) To enhance their reputation. c) To sell goods and services. d) To reduce the amount of actual cash they need to deal with. e) To induce people to visit a physical location.
answer
d) To reduce the amount of actual cash they need to deal with.
question
86) You decide to start a landscaping business called Trim Grass. One of your services will be to perform fertilizer treatments. You will need to buy a great deal of fertilizer for your many clients. You can use all of the following methods to purchase the fertilizer except: a) Forward auction b) Reverse auction c) Name your Own Price d) Electronic Marketplace e) Multichanneling
answer
e) Multichanneling
question
87) You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn't seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial? a) Banner ads b) Pop-up or pop-under ads c) Spamming d) Permission marketing e) Viral marketing
answer
c) Spamming
question
88) You decide to start a landscaping business called Trim Grass. Some of your residential clients would like to pay their bills online. Which of the following methods will not be appropriate for this type of payment? a) Electronic checks b) Electronic credit cards c) Purchasing cards d) Person-to-person payments e) Stored-value money cards
answer
c) Purchasing cards
question
89) You decide to start a landscaping business called Trim Grass. You expect to use the Web to help clients find you and communicate with you. You will mow lands, clean flower beds, and pick up leaves in the fall. You will send your clients monthly bills. Which of the following is true? a) Trim Grass is using an e-commerce model. b) Trim Grass is using an e-business model. c) Trim Grass is using a forward auction. d) Trim Grass is an electronic marketplace. e) Trim Grass needs to worry about channel conflict.
answer
b) Trim Grass is using an e-business model.
question
90) You have been running a landscaping business called Trim Grass for about two years. You have developed a special blend of grass seed for your area that you use when you reseed your clients' lawns. You are receiving e-mails via your Web site from people who would like to purchase some. You decide to start selling seed online, and you hire someone to rebuild your Web site. Which of the following statements is not true? a) Trim Grass is now multichanneling. b) Trim Grass needs to think about how to ship the seed. c) Trim Grass will have to collect sales tax from all sales. d) Trim Grass will have more expenses. e) Trim Grass will need to consider different advertising methods.
answer
c) Trim Grass will have to collect sales tax from all sales.
question
1) Wireless computing does not really affect productivity.
answer
False
question
2) Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal between communicating devices.
answer
True
question
3) Wireless technologies are not changing the ways that organizations are doing business, but they are enabling organizations to do business faster.
answer
False
question
4) Short message service allows users to send short text messages on digital cell phones.
answer
True
question
5) Microwave transmissions are affected by environmental conditions such as storms.
answer
True
question
6) The higher the orbit of a satellite, the larger its footprint.
answer
True
question
7) The global positioning system is supported by GEO satellites.
answer
False
question
8) Radio transmissions are highly secure.
answer
False
question
9) Bluetooth is a wireless standard that enables temporary, short-range connection between mobile devices.
answer
True
question
10) A hotspot is a small geographical perimeter within which a wireless access point provides service to a number of users.
answer
True
question
11) Wi-Fi provides excellent security.
answer
False
question
12) In a mesh network, the motes transmit their data to a central computer.
answer
False
question
13) Mesh networks are reliable, efficient, and fault tolerant.
answer
True
question
14) Personalization means that a mobile device can provide real-time communication, independent of the user's location.
answer
False
question
15) A voice portal is a standard Web site that accepts voice commands.
answer
False
question
16) Mobile wallets enable users to make purchases with a single click from a mobile device.
answer
True
question
17) Telemetry is the science that measures physical remoteness by means of wireless transmissions from a remote source to a receiving station.
answer
True
question
18) Pervasive computing and virtual reality are just different names for the same thing.
answer
False
question
19) Two systems being developed to replace bar codes are QR codes and RFID systems.
answer
True
question
20) Rogue access points can be set up by employees.
answer
True
question
21) War driving is the act of locating wireless networks while driving around a certain area.
answer
True
question
22) Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? a) To make use of time that was formerly wasted b) To become more efficient c) Work locations are more flexible d) To be able to allocate working time around personal and professional obligations e) All of these
answer
e) All of these
question
23) Of the following, which is the major problem with smart phones? a) They are too slow. b) They are too expensive. c) They can be used to compromise security. d) Their screens are too small. e) Their browsers are not fully functional.
answer
c) They can be used to compromise security.
question
24) The capabilities of smart phones include all of the following except _________. a) A calculator b) E-mail c) A global positioning system d) Corporate transaction processing e) A full-function Internet browser
answer
d) Corporate transaction processing
question
25) Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. a) Phones, digital cameras b) Phones, pagers c) Digital cameras, phones d) Digital cameras, pagers e) Cheap, expensive devices
answer
a) Phones, digital cameras
question
26) Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a) Low, long, broadcast b) Low, short, line-of-sight c) High, long, broadcast d) High, short, broadcast e) High, long, line-of-sight
answer
e) High, long, line-of-sight
question
27) Which type of satellite has the largest footprint? a) Low-earth-orbit b) Medium-earth-orbit c) Geostationary d) Polar orbit e) Equatorial orbit
answer
c) Geostationary
question
28) The area of the earth reached by a satellite's transmission is referred to as its _____. a) Hotspot b) Coverage c) Footprint d) Zone e) Wireless area
answer
c) Footprint
question
29) The greatest problem with GEO satellites is which of the following? a) Propagation delay b) Expense c) Orbital life d) Size of the footprint e) Relative speed with respect to a point on the earth's surface
answer
a) Propagation delay
question
30) _____ is a satellite-based tracking system that enables users to determine a person's position. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system
answer
e) Global positioning system
question
31) Which of the following is not an advantage of radio? a) No metallic wires are needed. b) Radio waves propagate easily through office walls. c) Radio devices are inexpensive. d) Radio waves do not create electrical interference problems. e) Radio devices are easy to install.
answer
d) Radio waves do not create electrical interference problems.
question
32) The main problem with radio transmission is which of the following? a) Radio waves cannot travel through walls. b) When you travel too far from the source, the signal fades. c) Devices are difficult to install. d) Radio waves are slow. e) Devices are expensive to install.
answer
b) When you travel too far from the source, the signal fades.
question
33) The most common wireless technology for TV and DVD remote control devices is _______. a) Bluetooth b) Ultra-wideband c) Near-field communications d) WiMAX e) Infrared
answer
e) Infrared
question
34) _____ is a wireless standard that enables temporary, short-range connection between mobile devices. a) Bluetooth b) Wireless application protocol c) Short message service d) Wi-Fi e) Global positioning system
answer
a) Bluetooth
question
35) Which of the following is the most appropriate wireless networking standard for creating personal area networks? a) Wi-Fi b) Cellular radio c) Microwave d) Bluetooth e) WiMAX
answer
d) Bluetooth
question
36) Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a) Wi-Fi b) Microwave c) Ultra-wideband d) Infrared e) Bluetooth
answer
c) Ultra-wideband
question
37) _____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. a) Near-field communications b) Bluetooth c) Ultra-wideband d) Wi-Fi e) Infrared
answer
a) Near-field communications
question
38) Which of the following statements about Wi-Fi is not correct? a) Wi-Fi provides simple Internet access. b) Laptop PC scans contain chips that can send and receive Wi-Fi signals. c) Many companies offer free Wi-Fi access in their stores. d) Wi-Fi requires encryption for secure transmissions. e) Wi-Fi is expensive to set up.
answer
e) Wi-Fi is expensive to set up.
question
39) Which of the following is not inhibiting faster Wi-Fi expansion? a) Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b) A lack of security. c) The growth of WiMAX d) Unless the service is free, users have to log on to separate accounts for each hotspot. e) Wi-Fi services may not survive in the face of free hotspot access.
answer
c) The growth of WiMAX
question
40) A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. a) Transceiver b) Hotspot c) Local reception node d) Wireless network e) GPS location
answer
b) Hotspot
question
41) Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. a) 802.11a b) 802.11b c) 802.11c d) 802.11g e) WiMAX
answer
d) 802.11g
question
42) _____ networks use multiple Wi-Fi access points to create a wide area network. a) Mesh b) Pervasive c) Global d) Fixed e) Ubiquitous
answer
a) Mesh
question
43) _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. a) Bluetooth b) Cell phones c) A satellite d) Ultra-wideband e) Near-field communications
answer
b) Cell phones
question
44) The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. a) Wi-Fi b) 802.11b c) 802.11c d) 802.11g e) WiMAX
answer
e) WiMAX
question
45) The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. a) Mobility, broad reach b) Mobility, lack of expense c) Security, broad reach d) Security, mobility e) Broad reach, localization
answer
a) Mobility, broad reach
question
46) With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices. a) Ubiquity b) Convenience c) Instant connectivity d) B and C e) A, B, and C
answer
d) B and C
question
47) With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a) Ubiquity b) Convenience c) Instant connectivity d) Personalization e) Localization of products and services
answer
e) Localization of products and services
question
48) The development of mobile commerce is driven by all of the following factors except: a) The widespread availability of mobile devices. b) The cell phone culture. c) Increasing prices. d) Bandwidth improvement. e) It eliminates the need for a PC.
answer
c) Increasing prices.
question
49) Which of the following is not a mobile application in financial services? a) Transaction processing systems b) Mobile banking c) Wireless electronic payment systems d) Micropayments e) Wireless wallets
answer
a) Transaction processing systems
question
50) Parking meters that you can pay via your mobile telephone are an example of _________. a) Mobile banking b) Wireless electronic payment c) Wireless wallets d) Brokerage service e) Money transfer
answer
b) Wireless electronic payment
question
51) If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a) Wireless money transfer b) Wireless wallet c) Wireless bill payment d) Micropayment e) Wireless electronic payment system
answer
e) Wireless electronic payment system
question
52) Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. a) Viral marketing b) Permission advertising c) Geographical advertising d) Location-based advertising e) Direct marketing
answer
d) Location-based advertising
question
53) _____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets. a) Location-based services b) Telematics c) Pervasive services d) RFID e) Wi-Fi
answer
b) Telematics
question
54) Sense networks track users via all of the following technologies except _______. a) GPS b) Traffic cameras c) Cell towers d) Wi-Fi networks e) None of these
answer
b) Traffic cameras
question
55) _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. a) Telemetry b) Wireless access point c) Near-field communications d) Microwave e) Wireless positioning
answer
a) Telemetry
question
56) The generic term for technologies that use radio waves to automatically identify individual items is __________. a) Telemetry b) Bar codes c) Shipping labels d) Radio-frequency identification e) Wireless access points
answer
d) Radio-frequency identification
question
57) Which of the following is not a limitation of barcodes? a) They require line-of-sight to the scanning device. b) They are printed on paper. c) They identify the manufacturer, product, and item. d) They are difficult to use in a manufacturing plant. e) They are useless in determining expiration date.
answer
c) They identify the manufacturer, product, and item.
question
58) The major problem with RFID has been _______. a) Expense b) Bandwidth c) Location d) RFID readers e) RFID tags
answer
a) Expense
question
59) What would be the best use of RFID in a business? a) Transaction processing b) Supply chain management c) Personnel tracking d) Enabling communications with customers e) Decreasing network costs
answer
b) Supply chain management
question
60) _____ networks collect data from many points over an extended space. a) Bluetooth b) Ultra-wideband c) Wireless sensor d) WiMAX e) Wi-Fi
answer
c) Wireless sensor
question
61) Which of the following can be used for reading utility meters without a person having to get out of a truck? a) RuBee b) ZigBee c) Wi-Fi d) Near-field communications e) RFID
answer
b) ZigBee
question
62) The act of locating wireless local area networks while moving around a city is called ____. a) Eavesdropping b) War driving c) RF jamming d) Cybersquatting e) Installing rogue access devices
answer
b) War driving
question
63) A(n) _____ allows unauthorized entry into a wireless network. a) Lack of encryption b) Disgruntled employee c) Open node d) Illegal server e) Rogue access point
answer
e) Rogue access point
question
64) _____ refers to efforts by unauthorized users to access data traveling over wireless networks. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices
answer
c) Eavesdropping
question
65) In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a) RF jamming b) War driving c) Eavesdropping d) Telemetry e) Installing rogue access devices
answer
a) RF jamming
question
Refer to IT's About Business 8.6 - BP Uses Wireless Technologies: Wireless sensors can be used to increase safety and reliability by doing tasks that are too dangerous for humans.
answer
False
question
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. a) Unencrypted node b) Evil twin c) Open node d) Illegal server e) Unauthorized rogue access point
answer
b) Evil twin
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New